An organization found that some older third-party libraries are used in an application and were exploited by intruders. Which action is best for preventing a similar recurrence?
Remove all deprecated functions from the development project
Use secrets management for any embedded credentials
Add robust memory-safe calls to critical functions
Apply consistent updates and scans for external dependencies
Ensuring regular patching and updating of external dependencies is more effective than narrowly focusing on memory safeguards or secrets management. Properly managing third-party libraries detects known weaknesses and addresses them with updates. While memory-safe calls and secrets management bring additional security benefits, they do not resolve embedded weaknesses in outdated code. Removing deprecated functions further helps, but it does not address vulnerable libraries retained in the environment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are third-party libraries in software development?
Open an interactive chat with Bash
Why is it important to consistently update and scan external dependencies?
Open an interactive chat with Bash
How do vulnerability scanning tools help with managing third-party libraries?